|
||||||
|
||
|
Home > Recent files list software |
Related keywords: files, list, mailing list, recent, hide files, to do list, Files, PDF files, recent documents, compare files |
|
|
11. | PlexDomain: Domain-Name Search, Generation, Popularity and Analysis Toolkit 3.1 (plexobject.com) | ||
for Registration Registered Domains REAL-TIME NEWLY DELETED LISTS MONITORING DOMAINS FOR AVAILABILITY - Schedule background jobs and receive emails DIRECTORY CRAWLING FILTERING DOMAINS It supports filtering domains by searching number of links in: AltaVista AllTheWeb Teoma Alexa AOL HotBot Lycos Google DMOZ LookSmart MSN Yahoo POWER SEARCH FOR AVAILABLE DOMAINS - It | |||
Updated: 9, 2005 | Rating: 0 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
12. | SpeedOptimizer 2.0 (speedbit.com) | ||
At the end of the process you will be issued an Optimization Report listing the settings that have been optimized. Speeds Up all Internet-related data transmission Faster loading of web page elements (text and graphics) Accelerated downloading, uploading and streaming of content (music, movies, games, clips etc.) Faster delivery (transmission and receipt) of email massages and | |||
Updated: 9, 2005 | Rating: 16 | Author: Speedbit Speedbit | Size: 784 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
13. | CSSS 2.2 (sarbash.com) | ||
There is a function of scaring away, with the help of sound files playback (siren), and also recording of a sound on the disk. In case of voice modem usage, there is a possibility of listening of a guarded room by telephone. Features: - availability to determine the movement in a room by change of a sound background - pickup. - Dialing 1-5 telephone numbers in case of | |||
Updated: 9, 2005 | Rating: 0 | Author: Victor Sarbash | Size: 2640 kb | Demo Go to category: System Utilities > Other Similar programs | |||
14. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly | |||
Updated: 8, 2004 | Rating: 298 | Author: Jon Kagstrom | Size: 600 kb | Demo Go to category: System Utilities > Other Similar programs | |||
15. | Surf Spy 2.10 (bysoft.se) | ||
visited web site and stores it to a password protected encrypted file. For remote surveillance of networked PCs the log file can be sent secretly with email to a specified receiver. Ideal for parents who want to monitor their children while they are away. In the stealth mode, Surf Spy does not show up in the system tray, task bar, or task list. Surf Spy is compatible | |||
Updated: 9, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 1100 kb | Demo Go to category: Servers > Other Server Applications Similar programs | |||
16. | Vidamic Netlog 01-01-15 (adminpower.com) | ||
Automatic inventory. Vidamic Netlog is a smart inventory program that automatically generates a completed inventory card for each computer/client. Upon initial log-in, users are requested to provide the system with the following information: Your Name, Room or department, Computer Brand, ID-Number. Vidamic | |||
Updated: 9, 2005 | Rating: 48 | Size: 6343 kb | Demo Go to category: System Utilities > Other Similar programs | |||
17. | MDaemon 8.1.4 (altn.com) | ||
and validates inbound messages signed with DKIM. Read Alt-N's published white paper on DKIM and its implementation in MDaemon at http://www.altn.com/support/white_papers.asp. In addition to DKIM, MDaemon 8.1 includes support for Greylisting, a relatively new spam fighting technique which involves deferring the initial acceptance of a new mail message from unknown senders and | |||
Updated: 2, 2006 | Rating: 865 | Author: Arvel Hathcock | Size: 27591 kb | Demo Go to category: Servers > Mail Servers Similar programs | |||
18. | PlexDomain: Domain-Name Search, Generation, Popularity and Analysis Toolkit 3.1 (plexobject.com) | ||
for Registration Registered Domains REAL-TIME NEWLY DELETED LISTS MONITORING DOMAINS FOR AVAILABILITY - Schedule background jobs and receive emails DIRECTORY CRAWLING FILTERING DOMAINS It supports filtering domains by searching number of links in: AltaVista AllTheWeb Teoma Alexa AOL HotBot Lycos Google DMOZ LookSmart MSN Yahoo POWER SEARCH FOR AVAILABLE DOMAINS - It | |||
Updated: 9, 2005 | Rating: 0 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
19. | Ghost Keylogger 3.80 (keylogger.net) | ||
surveillance tool that records every keystroke to an encrypted log file. The log file can be sent secretly with email to a specified receiver. Ghost Keylogger also monitors the Internet activity by logging the addresses of visited homepages. It monitors time and title of the active application; even text in editboxes and message boxes is captured. The key logger runs completly | |||
Updated: 3, 2005 | Rating: 0 | Author: Jon Kagstrom | Size: 600 kb | Demo Similar programs | |||
|
Home > Recent files list software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|